Sec+ Quiz - 1

Sec+ Quiz - 1

Professional Development

15 Qs

quiz-placeholder

Similar activities

City & Guilds Level 3 Apprenticeship Coding and Logic

City & Guilds Level 3 Apprenticeship Coding and Logic

Professional Development

20 Qs

Sec+ CH.1 Review Test

Sec+ CH.1 Review Test

Professional Development

15 Qs

Linux Essentials

Linux Essentials

Professional Development

15 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

15 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

101-120

101-120

Professional Development

20 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

20 Qs

Sec+ Quiz - 1

Sec+ Quiz - 1

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Isabella S

Used 34+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 2 pts

An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO).

The hashing method

The encryption method

The registration authority

The certificate authority

The back-end directory source

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL. https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the following describes this attack?

On-path

Domain hijacking

DNS poisoning

Evil twin

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A systems administrator is troubleshooting a server's connection to an internal web server. The administrator needs to determine the correct ports to use. Which of the following tools BEST shows which ports on the web server are in a listening state?

Netstat

Ping

ssh

Ipconfig

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Chief Information Security Officer (CISO) requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the CISO requesting?

Lessons learned

Preparation

Detection

Containment

Root cause analysis

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst was called to investigate a file received directly from a hardware manufacturer. The analyst is trying to determine whether it is modified in transit before installation on the user's computer. Which of the following can be used to safely assess the file?

Check the hash of the installation file

Match the file names

Verify the URL download location

Verify the code-signing certificate

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee received a word processing file that was delivered as an email attachment. The subject line and email content enticed the employee to open the attachment. Which of the following attack vectors BEST matches this malware?

Embedded Python code

Macro-enabled file

Bash scripting

Credential-harvesting website

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security forensics analyst is examining a virtual server. The analyst wants to preserve the present state of the virtual server, including memory contents. Which of the following backup types should be used?

Snapshot

Differential

Cloud

Full

Incremental

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?